Eliminating periodic flush overhead of file I/O with non-volatile buffer cache

E Lee, H Kang, H Bahn, KG Shin - IEEE Transactions on …, 2014 - ieeexplore.ieee.org
… -call traces collected in the NOW project at UC Berkeley, a representative file I/O workload
trace [13]. … We traced the system call requests using the strace utility. Characteristics of the …

[PDF][PDF] Graybox NFS Caching

P Cychosz, G Kolpin - Citeseer
… Since the middlebox’s primary means of improving is microbenchmark results, we tested
it with recorded real-world system call traces (Sprite traces). However, in this case, we had …

Fpg-grow: A graph based pattern grow algorithm for application level io pattern mining

JL Zhang, JW Zhang, L Xu - 2010 IEEE Fifth International …, 2010 - ieeexplore.ieee.org
… And it can be applied in very large IO traces’ mining with acceptable cost linear to the trace
size. An extensive experimental study has shown promising results with our approach. The …

CISP-Growth: A Contiguous Item Sequential Pattern Mining Algorithm with Application Level IO Patterns

Z Jing-Liang, Z Jun-Wei, Z Jian-Gang… - … on Parallel and …, 2009 - ieeexplore.ieee.org
… C-Miner has solved this problem by cutting the whole trace into short subsequences with …
mining in application level IO traces. Only one scan for the trace is needed in our approach and …

A comparison of file system workloads

D Roselli, JR Lorch, TE Anderson - 2000 USENIX Annual Technical …, 2000 - usenix.org
… In this work, they traced three servers running BSD UNIX for slightly over three days. This
paper introduced a framework for workload analysis using metrics such as run length, …

PPMS: A peer to peer metadata management strategy for distributed file systems

D Yang, W Wu, Z Li, J Yu, Y Li - … and Parallel Computing: 11th IFIP WG …, 2014 - Springer
… In the second experiments, we simulate the metadata operations using the RES traces
and measure the performance in terms of hit ratio of the local MDS and the related MDS. …

Improving storage performance of high-performance computing systems by using the non-volatile buffer cache

H Choi, YH Shin, H Bahn - International Journal of Computers and …, 2021 - Taylor & Francis
… cache architecture, we perform trace-driven simulations. We … traces used in our simulations
are storage access traces gathered in the NOW project of UC Berkeley and the OLTP trace

[PDF][PDF] motd

R Kolstad - login Usenix Mag., 2001 - usenix.org
… This involves tracking all files created during the trace and ignoring files created toward …
trace studies be done? Can we subscribe to something that collects and publishes such traces? …

MINT: A Reliability Modeling Frameworkfor Energy-Efficient Parallel Disk Systems

S Yin, X Ruan, A Manzanares, X Qin… - IEEE Transactions on …, 2013 - ieeexplore.ieee.org
… Finally, we use real-world trace to validate the Access-Pattern-to-Utilizatoin sub model of the
MINT model. … We developed a tracedriven simulator using the Berkeley Web Trace [1] as a …

A hybrid cache for a popularity-based cache management scheme for a RAID storage system

Y Tao - 2015 - search.proquest.com
Traces In our simulation, We use Auspex traces originated from Berkeley[17], which is
collected in 1993 during a week from a NFS web server from with 236 clients. The Auspex trace